Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

HCIA-Security V4.0 Question and Answers

HCIA-Security V4.0

Last Update May 3, 2024
Total Questions : 91

We are offering FREE H12-711_V4.0 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H12-711_V4.0 free exam questions and then go for complete pool of HCIA-Security V4.0 test questions that will help you more.

H12-711_V4.0 pdf

H12-711_V4.0 PDF

$35  $99.99
H12-711_V4.0 Engine

H12-711_V4.0 Testing Engine

$42  $119.99
H12-711_V4.0 PDF + Engine

H12-711_V4.0 PDF + Testing Engine

$56  $159.99
Questions 1

The following description of asymmetric encryption algorithms, which item is wrong?

Options:

A.  

Compared with symmetric encryption algorithms, the security factor is higher.

B.  

Encryption is faster than symmetric encryption algorithms.

C.  

Public keys are generally disclosed to users.

D.  

Asymmetric encryption algorithms are a pair of keys, divided into public and private keys.

Discussion 0
Questions 2

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

Options:

A.  

Buffer overflow attack

B.  

SQL injection attacks

C.  

Worm attack

D.  

Phishing attacks

Discussion 0
Questions 3

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver ( )[Multiple choice]*

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 4

What are the correct entries in the following description of firewall security zones?

Options:

A.  

The DMZ security zone solves the problem of server placement well, and this security area can place devices that need to provide network services to the outside world.

B.  

The Local zone is the highest security zone with a priority of 99.

C.  

Data flows between security domains are directional, including Inbound and Outbound.

D.  

Normally, the two communicating parties must exchange messages, that is, there are messages transmitted in both directions between security domains.

Discussion 0
Questions 5

In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*

Options:

A.  

IGMP

B.  

ICMP

C.  

RIP

D.  

ARP

Discussion 0
Questions 6

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

Options:

A.  

3

B.  

2

C.  

1

D.  

4

Discussion 0
Questions 7

As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?

Options:

A.  

The4

B.  

The3

C.  

The2

D.  

The1

Discussion 0
Questions 8

During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*

Options:

Discussion 0
Questions 9

Which of the following is not included in the Business Impact Analysis (BIA).

Options:

A.  

Risk identification

B.  

Impact assessment

C.  

Incident handling priority

D.  

Business priorities

Discussion 0
Questions 10

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Options:

Discussion 0
Questions 11

The following description of investigation and evidence collection, which one is correct

Options:

A.  

Documentary evidence is required in computer crime.

B.  

In all investigation and evidence collection, it is best to have law enforcement agencies involved.

C.  

Evidence is not necessarily required in the course of the investigation.

D.  

Evidence obtained by wiretapping is also valid.

Discussion 0
Questions 12

WAF can accurately control and manage users' online behavior and user traffic.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 13

According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*

Options:

A.  

Participate in information security training

B.  

Backup or restore data

C.  

Develop an emergency response plan

D.  

Security hardening of the host

Discussion 0